Baltic States – CIS, Direct Speech, Financial Services, Forum, Latvia, Technology

International Internet Magazine. Baltic States news & analytics Thursday, 25.04.2024, 20:13

Ecom21: how to survive in the conditions of a virus epidemic

BC, Riga, 02.11.2017.Print version
The issue of cybersecurity is one of the most topical in e-commerce - it concerns owners of online businesses, software developers, financial experts and users. This subject will be discussed at the international conference eCom21 to be held in Riga on 16-17 November under the patronage of Latvian Rietumu Bank. One of the invited speakers is Denis Mateev, Head of ESET in Russia and the CIS countries - the international company, developer of antivirus software. On the eve of the forum, he talked about the latest trends and solutions in the field of cybersecurity, informed BC bank’s press service.

Press photo.

The subject of cybersecurity is raised at practically every conference of eCom21. What has changed in this area during the last year? 

One of the key issues of the year is the wide-scale WannaCry and Petya epidemics, which have harmed hundreds of companies worldwide. Still, in spite of the stir among the public, losses from famous encryptors form only the tip of the iceberg. Quite often, cyber attacks, which cause much more harm, are not widely covered by media. 

Already since 2015, we have seen a growing number of targeted attacks on the financial sector, and one can state with sufficient confidence that in the near future this industry will remain the focus of attention of cyber criminals. Attacks on banks will continue as long as they remain profitable, i.e. when income from a successful operation exceeds the risks and expenses for conducting it. 

According to the statistics, up to 67% of cyber attacks are delivered for the purpose of receiving a financial benefit. The victims can be both large commercial structures and representatives of SMEs. Small organisations (with less than 100 employees) are not always the priority goal for hackers, but may suffer due to the deficiencies present in their security system. 
The risk group includes companies, the business of which is directly related to information technologies. These are banks, players of the e-commerce market, communication operators, governmental institutions - it is easier to list the areas where information security is not critical. 

In general, according to the forecast of the research company IDC, by 2020 the damage of organisations from cyber crimes will exceed USD 1 trillion. 

What new threats will users face in the field of cybersecurity in the future? 

We expect the appearance of new and more complex attacks, primarily on the corporate sector. Even now we are seeing the appearance of new threats focused on devices of the internet of things. Our specialists do not exclude a possibility of a synthesis of threats, for example, appearance of ransomware, blocking smart devices and requiring of a ransom for restoration of access. 

The number of mobile threats, primarily for the Android platform, will continue to grow. In 2015, intruders released 200 new malicious programs for Android a month, in 2016 about 300. In 2017, the number of new threats for Android will increase to 400 a month. For comparison, not more than two threats with regards to iOS appear in a month. 

And if in 2007-2009 we observed an explosion in demand for antivirus products for PC, now similar events are taking place in the field of protecting smartphones and tablets for Android. 

Moreover, a group of researchers have announced critical vulnerabilities of the WPA2 protocol these days, which protects almost all Wi-Fi networks. In fact, it means that data transferred through the network protected by a password can be intercepted and decoded in the same way as in the public network. 

How will the growth of popularity of bitcoins and blockchain technologies affect cybersecurity? 

By considering the growing popularity of cryptocurrencies and blockchain, fraudsters and hackers of all types draw the focus of their attention to this area. 

One side of the problem is the appearance of malware intended for hidden mining. The attackers try to infect consumer devices with such software (native miners), in order to use their computation capacity for extracting cryptocurrencies into their wallet. Another method is web mining. In September, our virus laboratory published analysis of new malware, which extracts Feathercoin, Litecoin and Monero in browsers of users who visit certain websites. 

Programs for hidden mining do not bring a threat, like, for instance, encryptors or bank Trojans, which allow funds to be stolen from user accounts. On the other hand, the computation capacity may not be used without the permission of the user of that computer. Therefore, ESET antiviruses detect and block programs for hidden mining. 

The second part of the story is attempts to crack popular stock exchanges for cryptocurrencies and cyber attacks on ICO. In particular, this summer, the South Korean stock exchange for bitcoins Bithumb was cracked (the amount of stolen funds exceeded several million US dollars) and the website of the Singaporean startup Ethereum CoinDash (the amount of damage – USD 7.5 million). 

What means of protection do you offer against modern cyber threats? 

The number of cyber risks has increased - this is clear to both home users and companies. And if earlier some were doubting the necessity for comprehensive protection, now this issue is over. 

In the corporate segment, we observe a growing demand for comprehensive solutions for protecting the infrastructure of different sites. For example, we offer a set of such solutions for protecting infrastructure or different components of a network. 


In September, we launched the “Office Control and DLP Safetica” solution, which protects against threats related to the human factor – malevolent actions or errors of employees. 

Starting from October, subscription for the ESET Threat Intelligence information service is available for corporate customers – in fact, this is direct access to data on modern threats and cyber landscape, which are collected and analysed by our virus laboratories. The service is focused on the risk group organisations, which operate in the crosshairs of cyber criminals. 

In general, in my opinion, the prevailing factor that influences the reduction of the level of cyber threats is the increase of the competency level of the people who are engaged in building protection. We all learn how to live and work in the conditions of a virus epidemic, master new technologies and methods. This is a natural process; a reaction to changes of the external market. 






Search site